Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks
Li Z., Shen H.  IEEE Transactions on Mobile Computing 11 (8): 1287-1303, 2012. Type: Article
Date Reviewed: Dec 3 2012

The topic of the paper is the distribution of tasks in mobile ad hoc networks (MANETs), where tasks are performed by the cooperating nodes. Node computing resources are limited by assumption, and selfish nodes are not interested in cooperation. To enforce node cooperation, the authors implemented an estimation system using the reputations of the nodes and the price for package transfer. Reputation ratings classify nodes as trustworthy and untrustworthy. Virtual money is used to measure the cost of packet-forwarding services. The game theory approach (see [1] for various applications of this methodology in computer science) is used to investigate the effectiveness of the system of incentives, compared to solutions without such motivation methods. The results are based on the simulation of the network equipped with the proposed reputation evaluation methods and information about the cost charged by the nodes for the transfer of packets. From this, the authors argue that a clever, rich, or selfish node can manipulate the operation of the network. Theoretical and simulation studies of the interaction of nodes show the superiority of the proposed integrated system in finding a solution using individual assessments of reputation and valuation of node services.

The game theory approach to the analysis of packet forwarding in MANETs is the subject of many research projects [2,3]. The main aim of existing models is to construct the strategy of individual nodes based on payoffs for service--their own and that of others. This paper tries to solve the challenge of encouraging the nodes to cooperate in order to maximize the overall system benefit.

Reviewer:  Krzysztof Szajowski Review #: CR140712 (1303-0228)
1) Alpcan, T.; Basar, T. Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge, UK, 2011.
2) Felegyhazi, M.; Buttyan, L.; Hubaux, J. P. Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Trans. Mobile Computing 5, 5(2006), 463–476.
3) Kameda, H.; Altman, E. Inefficient noncooperation in networking games of common-pool resources. IEEE J. Selected Areas in Comm. 26, 7(2008), 1260–1268.
Bookmark and Share
  Reviewer Selected
 
 
Wireless Communication (C.2.1 ... )
 
 
Distributed Systems (C.2.4 )
 
 
Performance of Systems (C.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Wireless Communication": Date
Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks
Salehi M., Boukerche A., Darehshoorzadeh A.  Ad Hoc Networks 50(C): 88-101, 2016. Type: Article
Nov 16 2016
Wireless sensor networks: concepts, applications, experimentation and analysis
Fahmy H.,  Springer International Publishing, New York, NY, 2016. 614 pp. Type: Book
Oct 4 2016
Practical approximate k-nearest neighbor queries with location and query privacy
Yi X., Paulet R., Bertino E., Varadharajan V.  IEEE Transactions on Knowledge and Data Engineering 28(6): 1546-1559, 2016. Type: Article
Sep 20 2016
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy